Using The Pirate Bay and Kickass Torrents streaming service will get you hacked!!!

The Pirate Bay and Kickass Torrents users may be at risk with Torrents Time Plugin

After its launch last week, Torrents-Time streaming service made The Pirate Bay and Kickass Torrents one the world’s largest streaming sites. But the honeymoon is short lived as a security researcher has discovered several vulnerabilities in the plugin that streams the content to the torrent lovers.

According to developer,Andrew Sampson, the Torrents Time browser plugin that allows users to stream multimedia torrents in real time inside their browser is plagued by various security issues that range from XSS to MitM attacks.

For the uninitiate, Torrents Time is a new technology that allows users to instantly download and watch torrented material right inside their browser. Users who want to use Torrents Time have to download its installer, which sets up a local Node.js server and also adds an extension to your browser. Sites that employ it, like TPB and KAT, have to host a few files that allow the plugins to tap into their torrents database and query for torrent seeds and other data.

Sampson says that this is where Torrents-Time plugin is vulnerable. According to him, Torrents Time fails to implement CORS, leaves users vulnerable to attack. It does not properly implement CORS (Cross-Origin Resource Sharing), a crucial Web security mechanism that prevents resources from being loaded from different domains.

Sampson says that a potential hacker can create a specially crafted website loaded with malware to mimic a regular page (popup) created by TBP or KAT, and add their own malicious code, which, because of an improper CORS implementation, would be allowed to execute.

Sampson also found that he could open a Torrents Time video player inside this malicious page and serve the user the torrent files they wanted. This could let the user think they’re accessing a trustworthy Torrents Time video player, when, in reality, the attacker could be delivering malicious code in the background while the user is watching a movie.

Other critical with Torrents Time is that the JavaScript code delivered to the user’s browser could trickle down to the local Torrents Time Node.js server and query its API for details about the user. This function can be abused by advertisers to randomly check Internet users for those who have Torrent Time installed, and then collect information that can be used to track them online.

He also discovered that Torrents Time could also spy on users by tracking its users’ activity (IP, location, user agent, cookie, watched torrents, etc.).

Mac users are at even more risk from using Torrents Time according to Sampson. This is because Torrents Time app for Mac runs as a root user. This could open a huge security issue for Apple users a potential hacker abuses the app and installs malware on it. This is possible because Sampson discovered that the Torrent Time app could be forced to redownload the browser plugins at command. This process can be hijacked, and users will be forced to download a file from the attacker’s own server, probably laced with malware.

If that wasn’t bad enough, attackers could use malicious JS code to ping your local Torrents Time Node.js server with exactly 1024 bytes and force your CPU usage to skyrocket and remain between 50% and 80% until the Torrents Time service is shut down or crashes.

1 COMMENT

Warning! Torrents Time version 1.0 includes a Highly Horrible Trojan Horse Virus and a bunch of other dramatic security issues. Please update malicious links as soon as possible to avoid further damage. See source below.